An improved version of the SolarMarker malware has been described in detail by researchers. Improvements have been made, as well as new defence evasion strategies for remaining undetected. SolarMarker is a trojan that has multiple stages. To deploy their attack…
Latest posts - Page 63
Windows Print Spooler flaw exploited in the wild
The U.S Cybersecurity and Infrastructure Security Agency (CISA) has asked users to watch out for a vulnerability in the Windows Print Spooler. Although Microsoft had patched the vulnerability in February, the vulnerability is being actively exploited in the wild. Further,…
Leading the Next Waves of Botnet Attacks: Enemybot and Fodcha
Two botnets have been trying to infect people all over the world by exploiting flaws in modems, routers, and IoT devices. These botnets, which were dubbed Enemybot and Fodcha, were capable of launching DDoS attacks. About Enemybot Background The Enemybot,…
ZingoStealer by Hasker Gang emerges as a serious threat
ZingoStealer, a malware that steals data, has been tracked, and the malware has potent features that can steal data and load additional payloads. Further, the info-stealer can mine Monero cryptocurrency. What is ZingoStealer? Haskers Gang developed ZingoStealer, and the gang…
Attackers can take control of Aethon TUG Hospital Robots due to five flaws in JekyllBot
Aethon Tug hospital robots have been patched for at least five security flaws that might allow remote attackers to take control of the devices and disrupt the timely distribution of medication and lab tests. “Successful exploitation of these vulnerabilities could…
McDonald’s Warns Customers of the Data Breach in Costa Rica
McDonald’s customers in Costa Rica have been notified of a data breach in which their personal information was obtained. Client names, marital status, address, email, document identity number, and phone number have been left exposed, according to the advisory sent…
Elementor, a WordPress website builder plugin, plagued with a vulnerability
Elementor, a WordPress website builder plugin that has more than five million active installations, has a vulnerability that can lead to authenticated remote code execution. The vulnerability can be exploited to seize control over affected websites. Plugin Vulnerabilities revealed the…
VMware vulnerability allows attackers to take control of the Cloud infrastructure
On Thursday, VMWare, a cloud computing and virtualisation technology firm, pushed an update to fix a critical vulnerability in its Cloud Director product. The vulnerability could be exploited to execute codes remotely. The vulnerability labelled CVE-2022-22966 scores 9.1 out of…
LFI Vulnerability of Critical Importance was reported in Hashnode Blogging Platform
Hashnode, a developer-oriented blogging platform, has a previously undiscovered local file inclusion (LFI) vulnerability that might be exploited to gain access to sensitive data such as SSH keys, the server’s IP address, and other network information. The LFI is based…
The Qbot malware has switched to a new infection vector: Windows Installer
Phishing emails with password-protected ZIP archive attachments containing malicious MSI Windows Installer packages are now being used by the Qbot botnet to spread malware payloads. This is the first time the Qbot operators have used this strategy, which differs from…